Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 20:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://polimar-const.com/truist
Resource
win10v2004-20230221-en
General
-
Target
http://polimar-const.com/truist
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295261159668553" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4352 chrome.exe 4352 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4380 4352 chrome.exe 85 PID 4352 wrote to memory of 4380 4352 chrome.exe 85 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 4708 4352 chrome.exe 86 PID 4352 wrote to memory of 5028 4352 chrome.exe 87 PID 4352 wrote to memory of 5028 4352 chrome.exe 87 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88 PID 4352 wrote to memory of 2560 4352 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://polimar-const.com/truist1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9715a9758,0x7ff9715a9768,0x7ff9715a97782⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:22⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4792 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4840 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5000 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2432 --field-trial-handle=1816,i,7506548591243365866,7828329904914016984,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD54ebdb6efdf7944f6e10c56e51ce1cac3
SHA1ba6dcb182fd6a20fa053ac87f285c3a6ac53e65f
SHA25630616bfc49dad13ca8b931027c66601d64e6ee1ebc90d9c9944ae43bd96633c8
SHA512ab99a7a352b498cdcca9ee9d8e19e254ec3ac7966b96e5dba53c26daa8707d018c7fddb0a44d653c3b47eb0dd10d6479d38f67207a4a54a679782cd11ea4f858
-
Filesize
6KB
MD5c8dba5b213463d685b896b7e84d97f26
SHA14a9bd9b64971c9d8882c30fcc4fe6b149ede4ea3
SHA256febe7f04b6233f7988bba38633d034f5d0d04b7c591a5d307af5c44b9b825631
SHA512f294becc6dabb8416ca252265301c53e2a6c64a42acbe9c902d551e0f44f18575ac75409f802d0c570e73f604a2a29a0565d64275b93e00c6743291b362d7a3e
-
Filesize
9KB
MD59c3eee0d723d23f5aed581df8a5f00ca
SHA1df47d84e0efba0dd084d6a93df0f6bc18fc8c8a5
SHA256ad69064917276298de84da8b4e4127b65c070030b82e4cae16a68494a3be6072
SHA512396822661161e0524c52c7211bb5f48e4641187a2acd0e15ebb9086c2821d8d4cccdd67fb43d5bddc2d75c50669869e263a5e735bf42bbb7ce7be2294d4bd164
-
Filesize
9KB
MD5808dd190bedba3de737850f27ecad946
SHA1df6e1c46cb74c829202027feb22860145b1e3762
SHA256118e06119f5d843c6765d2b892365f8538943c5bebbaff9ca68d847ab372416b
SHA5120aba01814d3b9a79d9757293a33366548cc0a6be4fe71925777bb18e3076fbce93a1ab7e3bb116357435ecd544add4a32131131da13959c2c68b81d9349cb2fa
-
Filesize
15KB
MD5deacd227f799b1d9d405c435a5112aa1
SHA1d3aced3dba0b5068c7545de50b6bdb64d5359e1b
SHA2565e1b42f402cd42f7fc13cf53a336dcb29f51a68c8d5d68defab2569a09205eb8
SHA512d813dddd6f2e2869b6fb74aa566c6da1fdd7863ff49dff1705e11ba8527cedfec2f61fb29a190f370e85533909cf0f8e630805c407f1275d0c6b501a5a0ae442
-
Filesize
153KB
MD556675d3de6af51ffdb26692697a98018
SHA155d3e8a13ea38a0a0529f7728ae0e5be30a58651
SHA256f6d5a255f2b8aad4a5c6d831ce0d6b0c984d564bee86c71c1bd250360f4d5bb8
SHA512c9f37b2d059c454a82c49dbcbf8dd470764f10911d822ad375fe1aa067188fb46e021321146e34d7aad67befd9b97305f8a476a4b05fac7da542e0462cac2425
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd